Learn More
WMNs are low-cost access networks built on cooperative routing over a backbone composed of stationary wireless routers. WMNs must deal with the highly unstable wireless medium. Therefore, the design of algorithms that consider link quality to choose the best routes are enabling routing metrics and protocols to evolve. In this work, we analyze the state of(More)
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes is IP traceback. In this paper, we introduce and analyze a lightweight single-packet IP traceback system that does not store any data in the network core. The proposed system(More)
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many researchers conclude that there is no one-size-fits-all solution for all of the user and network-provider needs and, thus, advocate for a pluralist network architecture , which allows(More)
—In this paper, we propose to use OpenFlow as a platform for creating a virtual network environment. We analyze the advantages and disadvantages of using OpenFlow and develop a prototype to manage virtual networks. Our prototype allows network visualization, network monitoring, and flow control. Our analysis shows that the developed prototype can be used as(More)
The upcoming terrestrial digital television technology brings a new class of services to traditional TV sets. A set-top box may, for example , access the Internet and send e-mail. The interactive return channel makes these new services possible. This channel allows TV viewers to interact by sending data back to the TV broadcaster. In this article, we(More)
— This paper presents the design of a plug-in for the Optimized Link State Routing (OLSR) protocol with the Expected Transmission Time (ETT) metric and experiments in an indoor testbed. The ETT metric is implemented as a plug-in, keeping portability and facilitating its deployment on operational networks. Our design identifies important implementation(More)
1389-1286/$ see front matter 2014 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.bjp.2014.01.002 ⇑ Corresponding author. Tel.: +55 21 2629 5679. E-mail addresses: igor@ic.uff.br (I.M. Moraes), menezes@gta.ufrj.br (D.M.F. Mattos), lyno@gta.ufrj.br (L.H.G. Ferraz), miguel@gta.ufrj.br (M.E.M. Campista), rubi@uerj.br (M.G. Rubinstein),(More)
A wireless ad hoc network is a collection of wireless nodes that can dynamically self-organize into an arbitrary and temporary topology to form a network without necessarily using any pre-existing infrastructure. These characteristics make ad hoc networks well suited for military activities, emergency operations, and disaster recoveries. Nevertheless, as(More)
— On most denial-of-service (DoS) attacks, packets with spoofed source addresses are employed in order to disguise the true origin of the attacker. A defense strategy is to trace attack packets back to their actual source in order to make the attacker accountable and isolate him from the network. To date, the proposed traceback systems require either large(More)
— In this paper, we propose a new admission control mechanism for providing QoS in optical burst-switching networks (OBS). The proposed mechanism admits bursts of a given service class according to network load and a class-associated parameter. Based on this parameter, referred as load level, it is possible to differentiate the burst blocking probability(More)